General
-
Target
98e1aa492f377611e489361fbcf1fced75fe6c9028a214aeba35fa7ac577790b
-
Size
490KB
-
Sample
240619-pn91dsvdmq
-
MD5
208c31479a014536a9fe9c13acc0d403
-
SHA1
e9e082b4a5cbd4ce17168d4164dfa6fab84bf2cd
-
SHA256
98e1aa492f377611e489361fbcf1fced75fe6c9028a214aeba35fa7ac577790b
-
SHA512
c1835226ae6bafd4309806773dbfd782dd39f71ffc760a74a822559b017457d9ac1b4f7e53f53bde1bd16150b454d7732855588eba6fc8513ff2a4ac00e98b2a
-
SSDEEP
12288:+3Omoel/jaCQRwfzt/sWo5hZg1OpckFqUj7DWkR:Hmnl/2Cy/5hi0WkFlN
Static task
static1
Behavioral task
behavioral1
Sample
98e1aa492f377611e489361fbcf1fced75fe6c9028a214aeba35fa7ac577790b.exe
Resource
win7-20240611-en
Malware Config
Extracted
lokibot
http://midwestsoil.top/alpha/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
98e1aa492f377611e489361fbcf1fced75fe6c9028a214aeba35fa7ac577790b
-
Size
490KB
-
MD5
208c31479a014536a9fe9c13acc0d403
-
SHA1
e9e082b4a5cbd4ce17168d4164dfa6fab84bf2cd
-
SHA256
98e1aa492f377611e489361fbcf1fced75fe6c9028a214aeba35fa7ac577790b
-
SHA512
c1835226ae6bafd4309806773dbfd782dd39f71ffc760a74a822559b017457d9ac1b4f7e53f53bde1bd16150b454d7732855588eba6fc8513ff2a4ac00e98b2a
-
SSDEEP
12288:+3Omoel/jaCQRwfzt/sWo5hZg1OpckFqUj7DWkR:Hmnl/2Cy/5hi0WkFlN
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-